Skip to main content

Abstract

A system having Scalability is highly desirable since it promises a proportional performance boost subject to the resource increase provided. In this chapter we try to analyze the extent of scalability various cryptographic workloads can offer. We try to optimally map two eSTREAM (ECRYPT (2012) “eSTREAM: The European Network of Excellence in Cryptology (ECRYPT) Stream Cipher Project.” [1]) finalists stream ciphers, i.e., HC-128 (and HC-256) and Salsa20 on modern Graphics Processor Units (GPUs). On NVIDIAs GPUs we used CUDA programming framework to exploit their many-core architecture on which parallel homogeneous threads are executed in a Single Instruction Multiple Thread (SIMT) fashion. Many cryptographic algorithms, especially block ciphers due to their block wise operations, have reportedly gained remarkable performance speedups on GPUs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. ECRYPT (2012) eSTREAM: The european network of excellence in cryptology (ECRYPT) Stream cipher project. www.ecrypt.eu.org/stream

  2. Khalid A, Paul G, Chattopadhyay A (2013) New Speed records for Salsa20 stream cipher using an autotuning framework on GPUs. In: Progress in cryptology–AFRICACRYPT. Springer, Berlin, pp 189–207

    Google Scholar 

  3. Khalid A, Bagchi D, Paul G, Chattopadhyay A (2019) Optimized GPU implementation and performance analysis of HC series of stream ciphers. In: Information security and cryptology–ICISC. Springer, Berlin, pp 293–308

    Google Scholar 

  4. ECRYPT eBACS: The european network of excellence in cryptology (ECRYPT) benchmarking of cryptographic systems. http://bench.cr.yp.to/results-stream.html

  5. Bernstein DJ Hash functions and ciphers. In: Notes on the ECRYPT stream cipher project (eSTREAM). http://cr.yp.to/streamciphers/why.html

  6. Wu H (2008) The Stream Cipher HC-128. In: New stream cipher designs. Springer, Berlin, pp 39–47

    Google Scholar 

  7. Bernstein DJ (2008) The Salsa20 family of stream ciphers. In: New stream cipher designs. Springer, Berlin, pp 84–97

    Google Scholar 

  8. Neves S, Arajo F (2009) Cryptography in GPUs, Masters thesis, Universidade de Coimbra, Coimbra

    Google Scholar 

  9. Stefan D (2011) Analysis and implementation of eSTREAM and SHA-3 cryptographic algorithms, PhD dissertation, COOPER UNION

    Google Scholar 

  10. Iwai K, Nishikawa N, Kurokawa T (2012) Acceleration of AES encryption on CUDA GPUs. Int J Netw Comput 2(1):131–145

    Google Scholar 

  11. Nvidia C (2010) C programming guide version 3.2. NVIDIA Corporation, CA

    Google Scholar 

  12. Nvidia C (2009) NVIDIA’s next generation CUDA compute architecture: FERMI. Comput Syst 26:63–72

    Google Scholar 

  13. Manavski S et al. (2007) CUDA compatible GPU as an efficient hardware accelerator for AES cryptography. In: International conference on signal processing and communications (ICSPC). IEEE, pp 65–68

    Google Scholar 

  14. Biagio AD, Barenghi A, Agosta G, Pelosi G (2009) Design of a parallel AES for graphics hardware using the CUDA framework. In: International symposium on parallel and distributed processing (IPDPS). IEEE, pp 1–8

    Google Scholar 

  15. Liu G, An H, Han W, Xu G, Yao P, Xu M, Hao X, Wang Y (2009) A program behavior study of block cryptography algorithms on GPGPU. In: Fourth international conference on frontier of computer science and technology (FCST). IEEE, pp 33–39

    Google Scholar 

  16. Nishikawa N, Iwai K, Kurokawa T (2012) High-performance symmetric block ciphers on multicore CPU and GPUs. Int J Netw Comput 2(2):251–268

    Google Scholar 

  17. Nvidia C (2009) C programming best practices guide. Cuda toolkit, vol 2

    Google Scholar 

  18. Wu H (2004) A new stream cipher HC-256. In: Fast software encryption (FSE). Springer, Berlin, pp 226–244

    Google Scholar 

  19. Chattopadhyay A, Khalid A, Maitra S, Raizada S (2012) Designing high-throughput hardware accelerator for stream cipher HC-128. In: IEEE international symposium on circuits and systems (ISCAS). IEEE, pp 1448–1451

    Google Scholar 

  20. ECRYPT eSTREAM Optimized Code HOWTO (The european network of excellence in cryptology). www.ecrypt.eu.org/stream/perf/#results

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ayesha Khalid .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Khalid, A., Paul, G., Chattopadhyay, A. (2019). Study of Scalability . In: Domain Specific High-Level Synthesis for Cryptographic Workloads. Computer Architecture and Design Methodologies. Springer, Singapore. https://doi.org/10.1007/978-981-10-1070-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-1070-5_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-1069-9

  • Online ISBN: 978-981-10-1070-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics